Analysis
-
max time kernel
19s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 22:16
Behavioral task
behavioral1
Sample
revil-fixed.exe
Resource
win10v2004-20250314-en
General
-
Target
revil-fixed.exe
-
Size
126KB
-
MD5
329b8aaea517a511908683b56446db99
-
SHA1
9abe20a9c460a3e530cb96658541c6d25700a529
-
SHA256
c09c691d40d8b935de4b60c92e1d4fc85f409fb546fd4a5e5b5483ae150fbf20
-
SHA512
172d290abe8fef35e8bea43319dc68092c61389257c73e94fcde68f67f97022c1bbda1fe50cd35775bda6e2473af1bad0e5cdb2ff7060e8365bbbe4765a3b3fa
-
SSDEEP
1536:oxOUyl20w8bVZQ40iMSO1fY+iUyQs2r8t5p1ySotICS4A6QdZls8XzUXiWr4X5Fg:oMhQNDEtb3A2ZHjUyWr4X5FTDUA
Malware Config
Extracted
C:\Program Files (x86)\yfq6y-readme.txt
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/08DCD1C616F5D272
http://decoder.re/08DCD1C616F5D272
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3036 netsh.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: revil-fixed.exe File opened (read-only) \??\T: revil-fixed.exe File opened (read-only) \??\Y: revil-fixed.exe File opened (read-only) \??\B: revil-fixed.exe File opened (read-only) \??\L: revil-fixed.exe File opened (read-only) \??\P: revil-fixed.exe File opened (read-only) \??\S: revil-fixed.exe File opened (read-only) \??\U: revil-fixed.exe File opened (read-only) \??\Z: revil-fixed.exe File opened (read-only) \??\F: revil-fixed.exe File opened (read-only) \??\E: revil-fixed.exe File opened (read-only) \??\H: revil-fixed.exe File opened (read-only) \??\J: revil-fixed.exe File opened (read-only) \??\K: revil-fixed.exe File opened (read-only) \??\O: revil-fixed.exe File opened (read-only) \??\V: revil-fixed.exe File opened (read-only) \??\W: revil-fixed.exe File opened (read-only) \??\G: revil-fixed.exe File opened (read-only) \??\N: revil-fixed.exe File opened (read-only) \??\X: revil-fixed.exe File opened (read-only) \??\D: revil-fixed.exe File opened (read-only) \??\A: revil-fixed.exe File opened (read-only) \??\I: revil-fixed.exe File opened (read-only) \??\M: revil-fixed.exe File opened (read-only) \??\Q: revil-fixed.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File opened for modification \??\c:\program files\MoveSync.mpe revil-fixed.exe File opened for modification \??\c:\program files\msedge_installer.log revil-fixed.exe File opened for modification \??\c:\program files\NewShow.search-ms revil-fixed.exe File opened for modification \??\c:\program files\CheckpointTest.mpg revil-fixed.exe File opened for modification \??\c:\program files\RegisterGroup.docx revil-fixed.exe File opened for modification \??\c:\program files\ResolveConvertFrom.css revil-fixed.exe File opened for modification \??\c:\program files\RevokePing.js revil-fixed.exe File opened for modification \??\c:\program files\SuspendProtect.3gp revil-fixed.exe File opened for modification \??\c:\program files\UninstallUnlock.vdx revil-fixed.exe File opened for modification \??\c:\program files\EnterWrite.ttf revil-fixed.exe File opened for modification \??\c:\program files\ImportUnregister.jpeg revil-fixed.exe File created \??\c:\program files\tmp revil-fixed.exe File created \??\c:\program files (x86)\tmp revil-fixed.exe File created \??\c:\program files (x86)\yfq6y-readme.txt revil-fixed.exe File opened for modification \??\c:\program files\ConvertInvoke.dot revil-fixed.exe File opened for modification \??\c:\program files\DenyTest.ods revil-fixed.exe File opened for modification \??\c:\program files\PublishRestart.pptm revil-fixed.exe File opened for modification \??\c:\program files\FindImport.emf revil-fixed.exe File opened for modification \??\c:\program files\GetSelect.pptm revil-fixed.exe File opened for modification \??\c:\program files\RegisterDebug.mp2 revil-fixed.exe File opened for modification \??\c:\program files\StopEdit.vst revil-fixed.exe File opened for modification \??\c:\program files\ExportUnregister.clr revil-fixed.exe File created \??\c:\program files\yfq6y-readme.txt revil-fixed.exe File opened for modification \??\c:\program files\chrome_installer.log revil-fixed.exe File opened for modification \??\c:\program files\ClearCompress.docm revil-fixed.exe File opened for modification \??\c:\program files\MergeGrant.svgz revil-fixed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language revil-fixed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4084 revil-fixed.exe 4084 revil-fixed.exe 4084 revil-fixed.exe 4084 revil-fixed.exe 4084 revil-fixed.exe 4084 revil-fixed.exe 4084 revil-fixed.exe 4084 revil-fixed.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4084 revil-fixed.exe Token: SeTakeOwnershipPrivilege 4084 revil-fixed.exe Token: SeBackupPrivilege 1436 vssvc.exe Token: SeRestorePrivilege 1436 vssvc.exe Token: SeAuditPrivilege 1436 vssvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4084 wrote to memory of 3036 4084 revil-fixed.exe 94 PID 4084 wrote to memory of 3036 4084 revil-fixed.exe 94 PID 4084 wrote to memory of 3036 4084 revil-fixed.exe 94 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\revil-fixed.exe"C:\Users\Admin\AppData\Local\Temp\revil-fixed.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall set rule group="Network Discovery" new enable=Yes2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2184
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1436
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD559934d72925f554001c345c42b17ad29
SHA190a2e0e2570fd3db9260c05996b1893ab1e1bf0e
SHA256512b6430cb1ac9701281a5ec72c99f189f487bf6a5a7779f70e71668063711b8
SHA51280c057040a09189909e2d6fd6c03060b4b0f5887bd4c7a54c81d35b3b07a58fe88402a68c3a0e1d672c73ed4f7b83576fd949f4b9f06ae45617342a56a62a569